[Ended] Round 37 | Technical Document Scavenger Hunt
  

Sangfor Jojo Lv5Posted Jun-09-2025 10:00



Dear members,
We are excited to announce the launch of our Technical Document Scavenger Hunt! This activity encourages all users to dive deeper into our newly published technical document in the Knowledge Base, enhancing your understanding and engagement with the material.

Participating will sharpen your skills and allow you to collaborate and share insights with fellow users. Happy hunting, and may the best reader win!


1. Activity Rules                                                                                                         

1) The scavenger hunt is only open for Sangfor-verified VIP customers and partners.
2) There are 6 questions related to the provided documents. Please read the provided document and find the answers.

Read this document:  
[size=14.6667px]
[size=14.6667px]
3) Participants must submit their answers under this post by June 15th.
4) Winners will get the coins next Monday and check the system message at the homepage.
5) Each member can answer the questions only once. We will adopt your first answer, no matter how many times you submitted.


2. Activity Duration                                                                                                   

June 9 - June 15

3. How to Participate                                                                                                                                                                                                  
1) Browse the Questions:
We have provided a list of questions based on the document\'s content. Your goal is to find the
answers within the documents.

2) Read the Documents:
Start by simply reading the catalog. Taking your second reading with the given questions
which will make you read more efficiently.

3) Submit your answers:
Please click the following link to submit, and enter the community's registered e-mail address.

Entrance: https://forms.gle/G7ByWQzMcjMezQ7D6 (The scavenger hunt is only open for Sangfor-verified VIP customers and partners.)

4) Reply with "I submitted" to this post.


4.  Rewards (revised)                                                                                                   

1) Correct Answers: 100 coins for each correct answer.
2) Users participating in this event for four consecutive weeks will receive an extra 100 coins. (updated)
4) The users who joined this event four times a month with the highest accuracy rate will get an additional 200 coins. (updated)

This topic contains more resources

You must log in to download or view the file. Not registered yet? Register

x
Sangfor Jojo Lv5Posted Jun-09-2025 10:11
  

Here are the answers to the questions:

Q1: When performing a search with a single condition in Endpoint Secure 6.0.2, which of the following is NOT a valid search condition?
A. Domain name
B. IP Address
C. Executable file hash value
D. User's login time
D
Q2:  In the context of searching for potentially infected endpoints by domain name, which of the following statements is true regarding the use of wildcards?
A. Wildcards are not supported in domain name searches.
B. Wildcards can only be used at the beginning of a domain name.
C. Wildcards can be used anywhere within a domain name to perform a fuzzy search.
D. Wildcards can only be used at the end of a domain name.
C
Q3: Which of the following are valid conditions for a single condition search in Endpoint Secure 6.0.2?
A. Domain name
B. IP Address
C. Executable file hash value
D. File name
ABCD
Q4: When using a single condition search by domain name in Endpoint Secure 6.0.2, which of the following statements are true?
A. Multiple domain names can be entered separated by commas (,).
B. Fuzzy search using the wildcard () is supported.
C. The search is limited to exact matches only.
D. It can be used to query potentially infected endpoints and the processes communicating with the specified domain names.
ABD
Q5: When performing a search with a single condition in Endpoint Secure 6.0.2, you can search by domain name, IP Address, executable file hash value, or _______.
file name
Q6: In a search by domain name using Endpoint Secure 6.0.2, to query potentially infected endpoints and the processes communicating with the Emotet domain names, you can use the domain names vidriodecoracion.com, varivoda.com, wakan-tanka.com, and _______.
white-on-rice.com

Newbie517762 Lv5Posted Jun-09-2025 11:01
  
I submitted, thx.
Iwam Lv1Posted Jun-09-2025 11:48
  
I submitted
Newbie799575 Lv1Posted Jun-09-2025 11:49
  
I submitted
Newbie877525 Lv1Posted Jun-09-2025 11:49
  
I submitted
pbeugenio Lv2Posted Jun-09-2025 13:43
  
I submitted
Ian_ Lv1Posted Jun-09-2025 15:25
  
I submitted
pmateus Lv3Posted Jun-09-2025 16:15
  
I submitted
Enrico Vanzetto Lv4Posted Jun-09-2025 20:06
  
I submitted